Due to a weak Content Security Policy on the /proxy/*
route, an attacker can bypass the CSP of the media proxy and execute cross-site scripting when opening external images in a new tab/window.
A malicious feed added to Miniflux can execute arbitrary JavaScript in the user's browser when opening external resources, such as proxified images, in a new tab or window.
The CSP for the media proxy has been changed from default-src 'self'
to default-src 'none'; form-action 'none'; sandbox;
.
Upgrade to Miniflux >= 2.2.7
RyotaK (GMO Flatt Security Inc.) with takumi-san.ai
{ "nvd_published_at": "2025-04-03T18:15:47Z", "cwe_ids": [ "CWE-79" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2025-04-04T14:09:40Z" }